Cloud Object Storage 101

Object storage is a secure, simple, scalable, and cost-effective means of embracing the explosive growth of unstructured data enterprises generate every day.
Many organizations, like large service providers, have already begun to leverage software-defined object storage to support new application development and DevOps projects. Meanwhile, legacy enterprise companies are in the early stages of exploring the benefits of object storage for their particular business and are searching for how they can use cloud object storage to modernize their IT strategies, store and protect data while dramatically reducing the costs associated with legacy storage sprawl.
This Webcast will highlight the market trends towards the adoption of object storage , the definition and benefits of object storage, and the use cases that are best suited to leverage an underlying object storage infrastructure.
In this webcast you will learn:
•How to accelerate the transition from legacy storage to a cloud object architecture
•Understand the benefits of object storage
•Primary use cases
•How an object storage can enable your private, public or hybrid cloud strategy without compromising security, privacy or data governance

After you watch the webcast, check out the Q&A blog http://www.sniacloud.com/?p=220

Compliance is a fundamental pillar to effective risk management at any company. However, simply complying with laws and regulations without considering the broader threat landscape can result in disaster. Certainly, a balance between compliance and risk is necessary. Ensuring compliance represents an organization's starting point, not the endgame, should be a priority.

In a dynamic threat environment, forward-thinking organizations have concluded that the goal of total protection is elusive and that a risk-based approach to governance and management of cybersecurity is necessary. That is easier said than done, as the way most information security professionals measure risk today fails to quantify threats in terms the business can understand and use. In this CPE accredited webinar, our panel of experts will discuss:

*All attendees stand a chance of winning a $100 Amazon Gift Card by attending this webinar.

Achieving and maintaining GDPR compliance is a complex and expensive initiative for companies of all sizes, across all geographies and industries, and tech giants have already been sued for violating the terms, while major newspapers have been forced to restrict EU access to their websites for fear of noncompliance.

In June 2018, Dimensional Research on behalf of TrustArc surveyed 600 legal, information technology and privacy professionals, and found that 20% of companies surveyed believe they now are GDPR compliant, while 53% are in the implementation phase and 27% have not yet started their implementation. Now three months after deadline, it's clear that there is a lot work yet to be done in order for all companies to achieve full GDPR compliance.

In this CPE accredited webinar, our panel of experts will discuss the main issues and attendees will learn:

- The latest techniques to protect data and remediate breaches.
- How GDPR can support your corporate values and drive business value for customers and partners.
- What your organization needs to uncover data risks and avoid fines.
- How technology can enable continuous monitoring, maintenance, and demonstration of GDPR compliance, in an ongoing and efficient manner.

Data protection laws such as the General Data Protection Regulation (GDPR) are complex, and can impact a broad range of business roles, including legal, audit, HR and finance, not just IT. In achieving GDPR compliance, organizations should focus on getting these roles to work together in ongoing efforts to ensure governance, risk and compliance (GRC) across an organization, and not be distracted by the noise in the marketplace. Through the process of integrating GRC practices real value can be achieved, as long as all stakeholders work with one another and take practical, measured steps toward integration. Join our panel of experts on this CPE accredited webinar to learn how your organization can achieve this.

Learning Objectives

- Find out how to align risk management with enterprise performance management under the GDPR.
- Learn how to work with stakeholders to effectively integrate compliance activities, and gain transparency, efficiency and agility for process operations.
- Discover how to identify and manage the digital risks that matter, and which risk functions need to transform.

As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

Small businesses face great threats from cyber attackers every day, and do so with a fraction of the resources that mid-sized companies and large corporations have at their disposal. A small business’s network, its customer data, and its intellectual property is just as critical to its operation as a firm 100 times its size, but it lacks the skills, the processes and the technology to keep pace with ever-present cyber threats and defend itself. Join us for this session where Dark3 experts will outline how small businesses can protect themselves effectively by taking advantage of the confluence of cloud-based technologies, scalable automation and enterprise-grade cybersecurity expertise.

In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.

Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.

Qualifying participants will earn 1 CPE credit.

Learning Objectives

•Find out how to influence the correct stakeholders to successfully implement GRC at your organization.
•Learn basic security fundamentals to reduce the attack surface and secure the lines of defense.
•Discover strategies to mitigate threats and manage Reputational Risk.

GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?

Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

-The ISF’s phased approach to GDPR implementation
-Ways to determine the criticality of data and how to protect it appropriately
-The urgent actions that a business can take to get GDPR compliance started
-Common myths surrounding the GDPR, and guidance on cutting through the noise.

The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. While GDPR is a regulation enacted by the European Union, if your company has global operations or reaches a worldwide audience, your company is also likely subject to GDPR. This session will help you build your GDPR preparation checklist based on the key elements of a GDPR compliance program for companies based outside the EU, explain GDPR provisions most relevant to the use of security solutions, and discuss questions you should be asking your security team and service providers to understand the features available within your solutions to help you comply with GDPR.

The General Data Protection Regulation (GDPR) is a key legislation going into effect in May that it will affect all organizations that handle, store or pass through data of EU citizens.

Join this panel of Governance, Risk, Compliance and Security experts for an interactive Q&A as they discuss the importance of being GDPR-compliant:
- What GDPR means for cyber security
- GDPR requirements around data collection and governance, exposure and breach disclosure
- Evaluating your cyber risk
- Recommendations for achieving compliance post-deadline day
- Other regulation on the horizon

The General Data Protection Regulation (GDPR) comes into force on May 25th, 2018. The GDPR changes the way that consent is sought and managed and it sets a high standard for consent. Consent means offering people genuine choice and control over how you use their data. When consent is used properly, it helps you build trust and enhance your reputation.

The changes from the GDPR reflect a more dynamic idea of consent: consent as an organic, ongoing and actively managed choice, and not simply a one-off compliance box to tick and file away. This webinar will help you to decide when to rely on consent for processing and when to look at alternatives. It explains what counts as valid consent, and how to obtain and manage consent in a way that complies with the GDPR.

About the Speaker:
Kristy Gouldsmith, CIPP/E, LLB, LLM, PGCE, BA, is a senior data protection GDPR consultant and the managing director of Sapphire Consulting Group, a leading UK data protection consultancy. Sapphire Consulting Group provide GDPR services such as audits, policies, data sharing agreements and training. Kristy is also the Data Protection Officer for a number of organisations including a multi-national software-as- a-service company, a large London-based serviced-office company and several firms of solicitors.

In this webinar, Dr. Jones Lukose will tell us about the impact of the GDPR on the International Criminal Court. Compliance is a major issue, and in this session, you will learn about the obligations, challenges, processes and the future for the International Criminal Court using the Micro Focus solutions Content Manager, ControlPoint and IDOL.

The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.

Attend this CPE accredited educational webinar with our panel of experts to learn what you need to know about the GDPR and how to remain compliant.

Learning Objectives:

- Learn how to prepare for GDPR implementation
- Identify the real life challenges of compliance
- Learn about prioritizing plans and actions to effectively prepare for data protection
- Discover some of the benefits, approaches, and tools to comply with the GDPR

Brought to you by the Vivit Automation & Cloud Builders Special Interest (SIG) Group.

Attend this webinar to receive a live demonstration of public cloud service brokering, aggregation and governance using the Micro Focus Hybrid Cloud Management solution. HCM allows IT to easily aggregate public cloud resources into an end-user catalog, while providing governance and analytics to ensure business unit consumption is visible and within budget. In addition, learn how improved control of public cloud spending can help you start building a strong business case for cloud management.

The General Data Protection Regulation (GDPR) is a European Union law, but it's going to impact businesses beyond the EU. Basically, any business that collects and processes personal data of EU individuals will need to achieve GDPR compliance by deadline day, May 25th, 2018.

What are the privacy & security requirements for being GDPR compliant? -
- Why we should think beyond GDPR when it comes to improving data security?
- Are you compliant / ready when GDPR goes into effect next month?
- What are some last-minute items to complete before the GDPR deadline?

Join top experts for this interactive Q&A roundtable, streamed LIVE during RSAC week, as they discuss the implication of GDPR on managing digital identity, customer data, privacy and cyber security.

Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

Qualifying participants will earn 1 CPE credit.

Learning Objectives:

- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches

The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

Join this panel of world-class experts:

Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program

If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.

In order to properly control privacy data under GDPR, you need a plan for both classifying and understanding where that info is kept. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. In this webcast. Greg Forest from Contoural will discuss how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow. Topics include:
• An overview of key data classification frameworks including HIPAA, ISO, FIPS and others, their strengths and their weaknesses
• Key attributes that should go into your standard including privacy, confidentiality, IP and other types of sensitive information
• How to create a hybrid standard
• Sampling your standard with content, and using this to drive adjustments and fine tuning
• How to integrate data classification with record retention

Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.